DocumentCode
2856974
Title
Scheduling with privacy constraints
Author
Kadloor, S. ; Kiyavash, Negar ; Venkitasubramaniam, Parv
Author_Institution
ECE Dept., UIUC, Urbana, IL, USA
fYear
2012
fDate
3-7 Sept. 2012
Firstpage
40
Lastpage
44
Abstract
In multi-tasking systems where a finite resource is to be shared, a scheduler dictates how the resource is divided among competing processes. Examples of systems which have schedulers include, a computer where the CPU needs to be shared between the different threads running, a cloud computing infrastructure with shared computing resources, a network router serving packets from different streams etc. In such situations, when a processor is shared by multiple users, the delays experienced by jobs from one user are a function of the arrival pattern of jobs from other users, and the scheduling policy of the server. Consequently, a scheduling system creates a timing side channel in which information about arrival pattern from one user is inadvertently leaked to another. In this work, this information leakage is studied for a two user scheduling system. We first introduce a measure of privacy and then demonstrate that no scheduler can provide maximum privacy without idling/taking vacations, and consequently no policy can simultaneously be delay and privacy optimal.
Keywords
cloud computing; data privacy; scheduling; cloud computing infrastructure; finite resource; multitasking systems; network router serving packets; privacy constraints; scheduling system; shared computing resources; Delay; Estimation error; Privacy; Throughput; Time division multiple access; Scheduling policy; information leakage; timing side channels;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Theory Workshop (ITW), 2012 IEEE
Conference_Location
Lausanne
Print_ISBN
978-1-4673-0224-1
Electronic_ISBN
978-1-4673-0222-7
Type
conf
DOI
10.1109/ITW.2012.6404704
Filename
6404704
Link To Document